National Security Insiders: Sequestration is Going to Happen

Orhan Cam/Shutterstock.com

Sequestration is now the most likely scenario, according to 78 percent of National Journal's National Security Insiders, who are not optimistic that Congress and the White House will reach a deal to reduce the deficit by the March 1 deadline.

"Since neither side is able to put the national interest above their own political interests, automatic cuts will do their jobs for them," one Insider said.

President Obama last week called on Congress to pass a smaller package of spending cuts and tax reforms to delay sequestration a few more months past March 1, to avoid the $85 billion in across-the-board cuts divided between defense and nondefense discretionary accounts "until Congress finds a way to replace these cuts with a smarter solution." Republicans, however, quickly rebuffed that plan.

"If Republicans cannot get a new deal involving entitlement cuts but no added tax revenue, they prefer accepting sequestration cuts to defense programs as the price of getting some cuts to civil programs. If Democrats cannot get a deal involving more tax revenue but without entitlement cuts, they prefer accepting sequestration cuts to civil programs as the price of getting some defense cuts," one Insider said. "And neither side thinks it can get a new deal that is acceptable to it." With President Obama and House Speaker John Boehner, R-Ohio, still butting heads over the best plan, one Insider said it is "hard to see how this cast of characters can square the circle."

"Congress is similar to a defiant toddler; sometimes you've got to let them put their hand on the hot stove in order for them to learn a lesson," one Insider said.

A 22 percent faction was more optimistic that sequestration would be avoided. "In fine D.C. tradition, we will stumble forward until the moment of disaster and come forward with a suboptimal compromise," one Insider said. "It is what we do so well here."

Separately, 84 percent of Insiders said that the White House can use force preemptively if the U.S. uncovers credible evidence of a major cyberattack from abroad. The New York Times reported on the secret legal review that gives President Obama the broad power to launch such a strike if a cyberattack is imminent. "The president should be able to use force to defend the United States regardless of the nature of the threat," one Insider said. Another added: "A cyberattack that targets infrastructure could be as debilitating as a bomb."

The president's use of force is legitimate especially if the cyberattack adversely affects major portions of the nation's critical infrastructure, one Insider said. "Cyberspace must be regarded as a domain of warfare, just like we view air, sea, land, and space now. If a cyberattack results in loss of life or negatively impacts the economy, the president can legitimately use force in his response in order to neutralize the threat posed by the cyberattack."

The question here is what constitutes an attack and what is force in cyberspace, cautioned another Insider who agrees that the president should preempt a cyberattack. "Exploitation or attack via the Internet is different from a kinetic strike. The law of war and the resolution of other legal issues regarding cyberoperations are in their infancy. The standard for credible evidence will include a very broad range of factors that create great flexibility until the legal framework matures."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.